Information Technology Infrastructure and Security
Verified
Added on 2022/12/26
|13
|591
|20
Presentation
AI Summary
This presentation discusses the importance of information technology infrastructure and its security. It covers the current infrastructure, recommendations for security, ERP system management plan, e-commerce recommendations, and technologies to implement for data protection and network security.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Information technology infrastructure and its security
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Current infrastructure •The Company depends on a robust infrastructure. •The infrastructure comprises of different hardware and software in its systems. •There are different sections in which the infrastructure is divided (Bennett et al., 2013). •There are various management level present in the infrastructure of the company. •The infrastructure is based on different technologies that works automatically.
recommendatio ns •Hardware firewall can be implemented. •Firewall will protect the information technology infrastructure. •Different type of software must be implemented so that phishing attacks can be prevented. •Data can be protected by the method of authentication and different encryption technology.
Up gradation of the system drawings •The network diagram of the system need to be upgraded. •The up gradation will help in preventing the different harms. •Network need to be updated. •The drawing must be more elaborate. •The system drawing is congested.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Erp system management plan •It is an integrated software application. •It is used to manage and control both the external and internal factors (Hudis et al., 2015). •All the functions of the organization is managed. •It helps the employees to perform the different business. •It helps in the implementation of the different business process.
ERP Human Resource Management Customer Relationship Management Manufacturing Resource Management Supply Chain Management Financial Resource Management Image: ERP Planning (Source: As created by the author)
E-commerce recommendation •Different online strategies can be implemented. •The e-commerce platform must be attractive. •The e-commerce plans requires the reuse and recycle process. •Introduction of different filtering systems (Moghe, Gehani & Smith, 2014).
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
security recommendations •Different security can be implemented in the system. •The security can be hardware and software security (Soomro, Shah& Ahmed, 2016). •Different Policies need to be implemented. •All the employees must be educate.
•Firewall can be implemented. •Proxy servers can be used. •Unauthorized access must be prevented. •Access of different type of information from different location must be denied. Hardware implementation for security
Software implementation for security •Strong encryption method can be used. •Separate network for the guest is required. •The MAC authentication need to be enabled for the users. •Different anti-virus software must be implemented. •Requires software for protection against the various phishing attacks.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Technologies that can be implemented •Data protection technology must be implemented. •Different network security must be enabled in the system. •Various data masking and data encryption is used. •The employees must be well trained.
References Bennett, J., Stager, M., Shevlin, G., & Tang, W. (2013). U.S. Patent No. 8,516,594. Washington, DC: U.S. Patent and Trademark Office. Hudis, E., Helman, Y., Malka, J., & Barash, U. (2015). U.S. Patent No. 8,959,568. Washington, DC: U.S. Patent and Trademark Office. Moghe, P., Gehani, N., & Smith, P. T. (2014). U.S. Patent No. 8,880,893. Washington, DC: U.S. Patent and Trademark Office. Soomro, Z. A., Shah, M. H., & Ahmed, J. (2016). Information security management needs more holistic approach: A literature review. International Journal of Information Management, 36(2), 215-225.